Researchers Propose Machine Learning-based Bluetooth Authentication Scheme

A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably. Called "Verification of Interaction Authenticity" (aka VIA), the recurring authentication scheme aims to solve the problem of passive, continuous authentication and automatic deauthentication…

New Microsoft Exchange ‘ProxyToken’ Flaw Lets Attackers Reconfigure Mailboxes

Details have emerged about a now-patched security vulnerability impacting Microsoft Exchange Server that could be weaponized by an unauthenticated attacker to modify server configurations, thus leading to the disclosure of Personally Identifiable Information (PII). The issue, tracked as CVE-2021-33766 (CVSS score: 7.3) and coined "ProxyToken," was discovered by Le Xuan Tuyen, a…

ESCON Global 2021 – opportunity to join free

ESCON Global 2021 ” The Leading Enterprise Security Conference” The Middle East has witnessed a healthy adoption of cybersecurity solutions for transformative digital technologies to avoid the increasing complex number of threats. The scope of the market covers segmentation on the basis of Solution including Threat Intelligence and Response Management,…
1 2 3 21